Results 51 to 60 of about 62,745 (179)

Experimental unconditionally secure bit commitment

open access: yes, 2013
Bit commitment is a fundamental cryptographic task that guarantees a secure commitment between two mutually mistrustful parties and is a building block for many cryptographic primitives, including coin tossing, zero-knowledge proofs, oblivious transfer ...
Adán Cabello   +16 more
core   +1 more source

Harnessing Blockchain for Sustainable Business Strategy: A Case Study on Enhancing Accounting Practices

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone   +3 more
wiley   +1 more source

On the Reachability Problem in Cryptographic Protocols [PDF]

open access: yes, 2000
We study the verification of secrecy and authenticity properties for cryptogra- phic protocols which rely on symmetric shared keys. The verification can be reduced to check whether a certain parallel program which models the protocol and the specification can reach an erroneous state while interacting with the environment.
Amadio, Roberto M., Lugiez, Denis
openaire   +4 more sources

High-level Cryptographic Abstractions

open access: yes, 2019
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham   +4 more
core   +1 more source

Experimental Quantum Coin Tossing

open access: yes, 2004
In this letter we present the first implementation of a quantum coin tossing protocol. This protocol belongs to a class of ``two-party'' cryptographic problems, where the communication partners distrust each other.
A. Ambainis   +9 more
core   +1 more source

IoT Technology as an Effective Strategy Enhances Food Authentication for Current Fresh Fruit Supply Chain

open access: yesFuture Postharvest and Food, EarlyView.
ABSTRACT With trade globalization, food fraud such as tampering, substituting, and falsifying, challenges human health and the management of food supply chain. As a food type that only processed at primary level, the authenticity of fruit supply information has become a guarantee for its edible safety.
Yiqin Zhang   +6 more
wiley   +1 more source

Coin Tossing is Strictly Weaker Than Bit Commitment

open access: yes, 1999
We define cryptographic assumptions applicable to two mistrustful parties who each control two or more separate secure sites between which special relativity guarantees a time lapse in communication. We show that, under these assumptions, unconditionally
A. Kent   +9 more
core   +1 more source

CMOS compatible multi‐state memristor for neuromorphic hardware encryption with low operation voltage

open access: yesInfoMat, EarlyView.
With the development of artificial intelligence and big data, hardware encryption has emerged as a key technology for secure communication. This study developed an HfAlOx‐based memristor with eight distinguishable resistance states, and realized novel neuromorphic hardware encryption.
Bo Sun   +6 more
wiley   +1 more source

Specifying a Cryptographical Protocol in Lustre and SCADE [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2020
In Proceedings MARS 2020, arXiv:2004.12403.
openaire   +4 more sources

Cylindrical Vector Beam Multiplexing based on All‐Dielectric Fiber Meta‐Tips Enabling High‐Capacity Bidirectional Optical Communication

open access: yesLaser &Photonics Reviews, EarlyView.
Cylindrical vector beam (CVB) multiplexing offers a viable solution to channel capacity, integration, and unidirectional transmission challenges in fiber‐rich sixth‐generation backbone networks. An all‐dielectric fiber meta‐tip‐enabled CVB multiplexing system is proposed and demonstrated, providing high‐capacity, bidirectional optical interconnects and
Jinke Li   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy